A presentation I designed for my course Data Communication and Network on VPN (Virtual Private Network) what is it, how it works, which technologies are being used, and what are characteristics of a good vpn.
2. HOW A VPN WORKS?
A VPN hides your IP address by letting the network redirect it through a
specially configured remote server run by a VPN host. This means that if you
surf online with a VPN, the VPN server becomes the source of your data.
This means your Internet Service Provider (ISP) and other third parties
cannot see which websites you visit or what data you send and receive
online. A VPN works like a filter that turns all your data into "gibberish". Even
if someone were to get their hands on your data, it would be useless.
3. THE HISTORY OF VPNS
Since humans have been using the internet, there has been a movement to
protect and encrypt internet browser data. The US Department of Defense
already got involved in projects working on the encryption of internet
communication data back in the 1960s.
In 1993, a team from Columbia University and AT&T Bell Labs finally
succeeded in creating a kind of first version of the modern VPN, known as
swIPe: Software IP encryption protocol.
In 1996, a Microsoft employee named Gurdeep Singh-Pall created a Peer-to-
Peer Tunneling Protocol (PPTP).
4. EARLY VPNS
The first VPNs started in the early 2000s, but were almost exclusively used
by companies. However, after a flood of security breaches, especially in the
early 2010s, the consumer market for VPNs started to pick up.
5. VPNS AND THEIR CURRENT USE
According to the GlobalWebIndex, the number of VPN users worldwide
increased more than fourfold between 2016 and 2018. In countries such as
Thailand, Indonesia and China, where internet use is restricted and
censored, one in five internet users uses a VPN. In the USA, Great Britain
and Germany, the proportion of VPN users is lower at around 5%, but is
growing.
One of the biggest drivers for VPN adoption in recent years has been the
increasing demand for content with geographical access restrictions(Netflix).
6. WHAT KIND OF VPNS ARE THERE?
Remote Access VPN : Remote access VPN is established when a single
device connects to a remote network. This is probably the case for most
VPN home users. We download VPN software on our smartphones or
computers, log in with our credentials, and select a VPN server to connect.
Remote access VPN can also benefit company employees who need access
to company resources when working at home.
Site-To-Site VPN : Site-to-site VPN is common for companies that have
offices in different geographical locations. It connects a network of one office
to a network of another, which allows two different offices to share private
resources securely over the internet. Site-to-site VPN largely differentiates
itself from remote access VPN in that it creates a private link between two
different networks instead of a single device and a network.
7. VPN PROTOCOLS
OpenVPN — OpenVPN remains the most popular and most secure VPN protocol
that is used on all types of different devices. OpenVPN is an open-source project
developed for multiple types of authentication methods. It is a very versatile
protocol that can be used on many different devices, with a variety of features, and
over any port with UDP or TCP. OpenVPN offers excellent performance and strong
encryption using the OpenSSL library and TLS protocols.
•IKEv2/IPSec — Internet Protocol Security with Internet Key Exchange version 2 is
a fast and secure VPN protocol. It is automatically pre-configured in many
operating systems, such as Windows, Mac OS, and iOS. It works very well for re-
establishing a connection, especially with mobile devices. The one downside is that
IKEv2 was developed by Cisco and Microsoft and is not an open-source project,
like OpenVPN. IKEv2/IPSec is a great choice for mobile users who want a fast,
light-weight VPN that is secure and can quickly reconnect if the connection is
temporarily lost.
• WireGuard — WireGuard is a new and experimental protocol that aims to offer
improved security and better performance in comparison to existing VPN protocols.
While it remains under active development and has not yet been audited, there are
a few VPN providers supporting it for testing purposes only.
8. Each VPN protocol has its own pros and cons. OpenVPN is the most popular
and widely-recommended, because it is secure, open-source, and also offers
good performance. But it also requires the use of third-party apps.
L2TP/IKEv2 is also a secure protocol with excellent performance and it can
be used natively on most operating systems (no apps required) — but it’s not
open source.
9. HOW DO I INSTALL A VPN ON MY
COMPUTER?
VPN client:
Software must be installed for standalone VPN clients. This software is configured to
meet the requirements of the endpoint.
Browser extensions
VPN extensions can be added to most web browsers such as Google Chrome and
Firefox. Some browsers, including Opera, even have their own integrated VPN
extensions.
Router VPN
If multiple devices are connected to the same internet connection, it may be easier to
implement the VPN directly on the router than to install a separate VPN on each device.
A router VPN is especially useful if you want to protect devices with an internet
connection that are not easy to configure, such as smart TVs.
10. WHY A VPN IS NECESSARY FOR
ONLINE PRIVACY
When using a VPN, your internet provider can only see that you’re online
and connected to a VPN server. That’s it. Your information is encrypted and
secured, which makes it unreadable to third parties.
With a VPN, public WiFi hotspots are once again safe to use, thanks to
secure encryption that protects your data. Using public WiFi without a VPN is
risky because hackers can exploit public wireless to steal your identity, credit
cards, bank accounts, passwords, etc. A VPN will encrypt and protect this
data from third parties and hackers.
11. WHAT SHOULD A GOOD VPN DO?
•Encryption of your IP address: The primary job of a VPN is to hide your IP address
from your ISP and other third parties. This allows you to send and receive
information online without the risk of anyone but you and the VPN provider seeing it.
•Encryption of protocols: A VPN should also prevent you from leaving traces, for
example, in the form of your internet history, search history and cookies. The
encryption of cookies is especially important because it prevents third parties from
gaining access to confidential information such as personal data, financial
information and other content on websites.
•Kill switch: If your VPN connection is suddenly interrupted, your secure connection
will also be interrupted. A good VPN can detect this sudden downtime and terminate
preselected programs, reducing the likelihood that data is compromised.
•Two-factor authentication: By using a variety of authentication methods, a strong
VPN checks everyone who tries to log in. For example, you might be prompted to
enter a password, after which a code is sent to your mobile device. This makes it
difficult for uninvited third parties to access your secure connection.
12. WILL A VPN MAKE ME 100%
ANONYMOUS?
Yes and no. VPNs are safe depending on who is running the server. If the
owner of the VPN logs your data/info and the connection is not encrypted,
then it is not safe and could leave you exposed.
If the owner of the VPN has a secure and encrypted connection and does
not log at all, it is pretty safe.
To be safe, I suggest getting a premium paid VPN.